Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
The Ring Of Gyges 2.0: How Anonymity Providing Behaviors Affect Willingness To Participate In Online Deviance, Cassandra E. Dodge
The Ring Of Gyges 2.0: How Anonymity Providing Behaviors Affect Willingness To Participate In Online Deviance, Cassandra E. Dodge
USF Tampa Graduate Theses and Dissertations
Anonymity has long been discussed as a source of disinhibition. The myth of the Ring of Gyges illustrates how a person may act immorally solely because they know they will not be caught (Plato, 375/2017). Incorporating perspectives of rational choice and deterrence, anonymity serves as a form of risk reduction within hedonistic calculus (Beccaria, 1764/1963; Bentham, 1781/2000). Analogous to the myth of the Ring of Gyges (Plato, 375/2017), techniques of anonymity “hide” users from others while online. These techniques serve as a form of risk reduction, reducing the certainty of punishment (Becarria 1764/1963). Additionally, there are many ways by which …
Self-Protection In Cyberspace: Assessing The Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, And Victimization, C. Jordan Howell
USF Tampa Graduate Theses and Dissertations
The current study, using structural equation modeling, assesses the processual relationship between thoughtfully reflective decision making (TRDM), theoretical constructs derived from protection motivation theory (PMT), cyber hygiene, and online victimization to determine the cognitive decision-making process that leads to the adoption of online self-protective behaviors, which reduces the occurrence of victimization experiences. Findings, derived from a general sample of Internet users in the United States, reveal: (1) engagement in cyber hygiene practices, as a form of target hardening, decreases Internet users’ experiences with online victimization; (2) thoughtfully reflective decision makers, in the face of cyber threats, develop higher threat appraisals …